LABSIM for Wireless Chapter 10

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the maximum range of the Bluetooth 2.0 specification for Class 1 devices?

100 M

How many total channels are available for 802.11g wireless networks?

11

Which data transmission rate is defined by the IEEE 802.11b wireless standard?

11 Mbps

Which of the following are frequencies defined by 802.11 committees for wireless networking? (Select two.)

2.4 5.75

How many total channels are available for 802.11a wireless networks?

23

What s the frequence of 802.11a networking?

5.75 GHz

Which wireless standard operates at up to 54 Mbps to a maximum of 150 feet?

802.11a

You are designing a wireless network for a client. Your client needs the network to support a data rate of at least 54 Mbps. In addition, the client already has a wireless telephone system installed that operates 2.4 GHz. Which 802.11 standard will work best in this situation?

802.11a

Which IEEE wireless standards specify transmission speeds up to 54 Mbps? (Select two.)

802.11a 802.11g

Which IEEE standard describes wireless communication?

802.11b

You are troubleshooing a wireless connectivity issue in a small office. You determine that the 2.4 GHz cordless phones used in the office are interfering with the wireless network transmissions. If the cordless phones are causing the interference, which of the following wireless standards could the network be using? (Select two.)

802.11b Bluetooth

You are designing an update to your client's wireless network. The existing wireless network uses 802.11b equipment; which your client complains runs too slowly. She wants to upgrade the network to run 54 Mbps. Due to budget constraints, your client wants to upgrade only the wireless access points in the network this year. Next year, she will upgrade the wireless network boards in her users'' workstations. She has also indicated that the system must continue to function during the transition period. Which 802.11 standard will work best in this situation?

802.11g

You have been contacted by OsCorp to recommend a wireless Internet solution. THe wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solution would you recommend?

802.11g

Which type of configuration would you use if you wanted to deploy 802.11n technology to communicate directly between two computers using a wireless connection?

Ad hoc

Which of the following are characteristics of the 802.11g wireless standard? (Select three.)

Backwards compatible with 802.11a Operates in the 2. GHz range Maximum bandwidth of 54 Mbps

YOu have configured a wireless access pint to creat a small network. FOr security, you have disables SSID broadcast. From a client computer, you try to browse to find the access point. You see some other wireless networks in the area, but cannot see your network to connect to it. What should you do?

Configure a profile on the wireless client.

You have configured a wireless access point to create a small network. You have configured all necessary parameters. Wireless clients seem to take a long time to find the wireless access point. You want to reduce the time it takes for the clients to connect. What should you do?

Decrease the beacon interval.

Which of the following measures will make your wireless network invisible to the casual attacker performing war driving?

Disable SSID broadcast

Which remote access authentication protocol allows for the use of smart cards for authentication?

EAP

Which of the following features are supplied by WPA on a wireless network?

Encryption

Which of the following locations will contribute the greatest amount of interference for a wireless access point? (Select two.)

Near backup generators Near Cordless pones

Which of the following recommendations should you follow when placing access points to provide wireless access for users within your company building?

Place access points above where most clients are.

You have a small wireless network that uses multiple access pints. the network currently uses WEP. You want to connect a laptop computer to the wireless network. Which of the following parameters will you need to configure on the laptop (Select two.)

Preshared key SSID

Which of the following is used on a wireless network to identify the network name?

SSID

You want to connect your client computer to a wireless access point connected to your wired network at work. The network administrator tells you that the access point is configured to use WPA2 Personal with the strongest encryption method possible. SSID broadcast is turned off. Which of hte following must you configure manually on the client? (Slect three.)

SSID AES Preshared key

You are configuring a wireless network with two wireless access points. Both access points connect to the same wired network. You watn wireless users to be able to connect to either access point, and to be able to raom between the two access points. How should you configure the access points?

Same SSID, different channel

Which of the following common network monitoring or diagnostic activity can be used as a passive malicious attack?

Sniffing

What encryption method is used by WPA for wireless networks?

TKIP

You need to configure a wireless network. You want to use WPA Enterprise. WHich of the following components will be part of your design? (Select two.)

TKIP encryption 802.1x

Your organization uses an 802.11b wireless network. Recently, other tenants installed the following equipment in your building: *A wireless television distribution system running at 2.4GHz *A wireless phone system running at 5.8 GHz *A wireless phone system running at 900 MHz *An 802.11a wireless network running in the 5.725 - 5.850 GHz frequency range. *An 802.11j wireless network running in the 4.9 - 5.0 Ghz frequency range. Since this equipment was installed, your wireless network has been experiencing significant interference. Which system is to blame?

The wireless TV system.

On a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points?

Users with the correct WEP key.

On wireless networks, which technology is employed to provide the same type of protection that cables provide on a wire network?

WEP

Which of the following wireless security methods uses a common shared key configured on the wireless acess point and all wireless clients?

WEP

Which of the following are security protocols for wireless networks? (Select two.)

WEP WPS

Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?

WEP, WPA Personal, and WPA2 Personal

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?

WPA2

You need to add security for your wireless network. You would like to use the most secure method. WHich method should you implement?

WPA2

You are concerned about sniffing attacks on your wireless network. Which of the following implementations offers the best countermeasure to sniffing?

WPA2 and AES

How does WPA2 differ from WPA?

WPA2 uses AES for encryption; WPA used TKIP.


Kaugnay na mga set ng pag-aaral

Neutron Stars and Black Holes - Astronomy Chapter 11

View Set

Accounting Chapter 11, ch 10 managerial acct, Accounting, Chapter 9 Accounting II, Chapter 8 Managerial Accounting, Ch.7, SB 6, Chap 5, SB 4, ACT 2, Chapter 2, ACT 2

View Set

Ranked The Musical Lines - Jacquie

View Set

Legal & Social environment Exam 2

View Set

ENT - 201: Final Exam (Chapters 7 & 9-13)

View Set

somatoform and factitious disorders and sexual disorders

View Set